Analisis Dan Evaluasi Protokol Keamanan Jaringan Nirkabel Wi-Fi Protected Access 3 dengan Metode Penetration Testing
(1) Universitas Muhammadiyah Jember, Indonesia
(2) Universitas Muhammadiyah Jember, Indonesia
(3) Universitas Muhammadiyah Jember, Indonesia
(*) Corresponding Author
Abstract
Full Text:
PDFReferences
S. E. Prasetyo And R. C. Lee, “Analisis Keamanan Jaringan Pada Pay2home Menggunakan Metode Penetration Testing,” 2021. [Online]. Available: Https://Journal.Uib.Ac.Id/Index.Php/Combines
A. Kurniadi, “Analisis Keamanan Jaringan Wpa2-Psk Menggunakan Metode Penetration Testing (Studi Kasus : Tp-Link Archer A6),” 2021. [Online]. Available: Https://Journal.Uib.Ac.Id/Index.Php/Combines
M. A. Adiguna And B. W. Widagdo, “Analisis Keamanan Jaringan Wpa2-Psk Menggunakan Metode Penetration Testing (Studi Kasus : Router Tp-Link Mercusys Mw302r),” J. Siskom-Kb (Sistem Komput. Dan Kecerdasan Buatan), Vol. 5, No. 2, Pp. 1–8, 2022, Doi: 10.47970/Siskom-Kb.V5i2.268.
E. Lamers, “Securing Home Wi-Fi With Wpa3 Personal,” 2021.
B. Indira Reddy And V. Srikanth, “Review On Wireless Security Protocols (Wep, Wpa, Wpa2 & Wpa3),” Int. J. Sci. Res. Comput. Sci. Eng. Inf. Technol., Vol. 5, No. 4, Pp. 28–35, 2019, Doi: 10.32628/Cseit1953127.
R. Rachman Et Al., “Analisa Keamanan Jaringan Wireless Di Universitas Sam Ratulangi,” J. Media Inform. Budidarma, Vol. 1, No. 1, P. 178, 2021, Doi: 10.30865/Mib.V5i3.2979.
Y. Mulyanto, H. Herfandi, And R. Candra Kirana, “Analisis Keamanan Wireless Local Area Network (Wlan) Terhadap Serangan Brute Force Dengan Metode Penetration Testing (Studi Kasus:Rs H.Lmanambai Abdulkadir),” J. Inform. Teknol. Dan Sains, Vol. 4, No. 1, Pp. 26–35, 2022, Doi: 10.51401/Jinteks.V4i1.1528.
H. Haeruddin, “Analisa Dan Implementasi Sistem Keamanan Router Mikrotik Dari Serangan Winbox Exploitation, Brute-Force, Dos,” J. Media Inform. Budidarma, Vol. 5, No. 3, P. 848, 2021, Doi: 10.30865/Mib.V5i3.2979.
S. Sun And H. T. Canada, “A Chosen Random Value Attack On Wpa3 Sae Authentication,” Vol. 3, No. 2, 2022, Doi: 10.1145/3468526.
A. B. N. As-Sajid And R. E. Putra, “Analisis Dan Pengujian Dictionary Attack Terhadap Wpa3 Berbasis Script,” Vol. 05, Pp. 216–222, 2023.
E. Baray And N. Kumar Ojha, “Wlan Security Protocols And Wpa3 Security Approach Measurement Through Aircrack-Ng Technique,” Proc. - 5th Int. Conf. Comput. Methodol. Commun. Iccmc 2021, No. Iccmc, Pp. 23–30, 2021, Doi: 10.1109/Iccmc51019.2021.9418230.
A. A. Putra, “Analisis Dan Evaluasi Keamanan Wireless Lan Pada Pt. Bumi Jage Dalam,” Proceeding Semin. Nas. Ilmu Komput., Vol. 1, No. 1, Pp. 138–150, 2021, [Online]. Available: Https://Proceeding.Unived.Ac.Id/Index.Php/Snasikom/Article/View/59
A. Irfansyah, “Langkah-Langkah Penetration Testing Yang Perlu Kamu Ketahui,” Eduparx, 2023. Https://Eduparx.Id/Blog/Insight/Cyber-Security/Langkah-Langkah-Penetration-Testing-Yang-Perlu-Kamu-Tahu/ (Accessed Jan. 14, 2024).
A. Wi-Fi, C. P. Kohlios, And T. Hayajneh, “A Comprehensive Attack Flow Model And Security,” 2018, Doi: 10.3390/Electronics7110284.
DOI: http://dx.doi.org/10.30645/jurasik.v9i1.749
DOI (PDF): http://dx.doi.org/10.30645/jurasik.v9i1.749.g724
Refbacks
- There are currently no refbacks.
JURASIK (Jurnal Riset Sistem Informasi dan Teknik Informatika)
Published Papers Indexed/Abstracted By: